Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe
Resource
win10v2004-20241007-en
General
-
Target
0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe
-
Size
788KB
-
MD5
4e6f60799124a82140db48fcb1a9185e
-
SHA1
423ecedccf4e4b38b17f9636b571377020f2b1e5
-
SHA256
0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c
-
SHA512
a7d646dcd85fa7841335bf9097f0950f898d23c7072b1375709052bef0ec6584d7a8dab0d4b2c0d90f021f8015466d23c0f3fd84967713a50a4a68e9dc8b64cf
-
SSDEEP
12288:hMrIy90wNOiuCXOar1nlwp21b+wEYjpZo0/To3mpgGVq828vtNTONI3Wu:ByHfXOaRlscpZqrGJL/TOYJ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2640-19-0x00000000049D0000-0x00000000049EA000-memory.dmp healer behavioral1/memory/2640-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/2640-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-44-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2640-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro7795.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7795.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4364-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3428-2155-0x0000000000210000-0x0000000000240000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906412.exe family_redline behavioral1/memory/1192-2166-0x0000000000550000-0x000000000057E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu5548.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu5548.exe -
Executes dropped EXE 5 IoCs
Processes:
un378325.exepro7795.exequ5548.exe1.exesi906412.exepid process 2848 un378325.exe 2640 pro7795.exe 4364 qu5548.exe 3428 1.exe 1192 si906412.exe -
Processes:
pro7795.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7795.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exeun378325.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un378325.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2872 2640 WerFault.exe pro7795.exe 1660 4364 WerFault.exe qu5548.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu5548.exe1.exesi906412.exe0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exeun378325.exepro7795.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si906412.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un378325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7795.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7795.exepid process 2640 pro7795.exe 2640 pro7795.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7795.exequ5548.exedescription pid process Token: SeDebugPrivilege 2640 pro7795.exe Token: SeDebugPrivilege 4364 qu5548.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exeun378325.exequ5548.exedescription pid process target process PID 2276 wrote to memory of 2848 2276 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe un378325.exe PID 2276 wrote to memory of 2848 2276 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe un378325.exe PID 2276 wrote to memory of 2848 2276 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe un378325.exe PID 2848 wrote to memory of 2640 2848 un378325.exe pro7795.exe PID 2848 wrote to memory of 2640 2848 un378325.exe pro7795.exe PID 2848 wrote to memory of 2640 2848 un378325.exe pro7795.exe PID 2848 wrote to memory of 4364 2848 un378325.exe qu5548.exe PID 2848 wrote to memory of 4364 2848 un378325.exe qu5548.exe PID 2848 wrote to memory of 4364 2848 un378325.exe qu5548.exe PID 4364 wrote to memory of 3428 4364 qu5548.exe 1.exe PID 4364 wrote to memory of 3428 4364 qu5548.exe 1.exe PID 4364 wrote to memory of 3428 4364 qu5548.exe 1.exe PID 2276 wrote to memory of 1192 2276 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe si906412.exe PID 2276 wrote to memory of 1192 2276 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe si906412.exe PID 2276 wrote to memory of 1192 2276 0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe si906412.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe"C:\Users\Admin\AppData\Local\Temp\0031da62e68086ff7ce9d8b15b8b0c6bfd66a9b453d3f3bc766447b7e547825c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un378325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un378325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7795.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7795.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 10844⤵
- Program crash
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5548.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 13844⤵
- Program crash
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906412.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si906412.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2640 -ip 26401⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4364 -ip 43641⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD564ee3a07d3437a363c51fcd3470a3989
SHA14d69eaabdea7dd860720e00cab9e0f0b5b39ea68
SHA256bc14288d285f8bda9ea8636195d3600817fe8c5a17deb919a7a3c595aebacc88
SHA512b073dd0be32562faa96b2c7d67c1f85fdd9de2e687e07fd13a029e56cc4fef6e3ad7fda2b7bfe24383d06d9cb8315adcdae6897f2153556ae69d7582578965f7
-
Filesize
634KB
MD5026afbf1db96cf34e6ba417db3f08665
SHA1c9a728e769502bbd59583df25a49e98395253d67
SHA256a14b14607def26a54bfefcfab11ced4f84d6d7db0b8b2efc4ff1258c8a3d1d71
SHA512961499fabaad467583d8ac7472b9470d38361a6bedeb3afaa93075704b50f0252c80fc13a47389530f7eb6c7ea16feb934e765b8d54e1adbda9adb3c103a2b81
-
Filesize
231KB
MD58fc9fbe1333f245626222530134b3a30
SHA1164f848e9c6acf60f76909ddac9543881a071527
SHA25661b37790de3e424c5fdc457f3746cd5068a268dbdfee3b2159fe9643d5c35580
SHA5120b0fd9798a18683c9447b0ab4ede32021a64db92d698af9cb04c385be81daf8fb843efc8113b389f95a21687d6cf796b2a2780a56011431c25debab34b634252
-
Filesize
415KB
MD58c3da293b96866dd2f85b44b7471c9a9
SHA18f1d6689f6fc9faecca57d8b41e7b921b5bb4f56
SHA256bb2280b25c1a2a8d2bfe1207a200143d56c7528dee609335447d9bcacccdac89
SHA512ecb302300b2d3551792e54a9189149a80d2db8d39a423b51e00389ffc8ef4c08cf1fd31afa43eedf89b5897cdaf9bfe1d9550782545bf132573a02ab257b00d9
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0